Tobias Schmidt (@tpschmidt_) 's Twitter Profile
Tobias Schmidt

@tpschmidt_

Helping aspiring engineers master the cloud

๐Ÿ‘จโ€๐Ÿ’ป Freelance Software Engineer
โœ๏ธ Book #1: awsfundamentals.com
๐Ÿ“• Book #2: cloudwatchbook.com

ID: 42399689

linkhttps://awsfundamentals.com/newsletter?utm_source=twitter calendar_today25-05-2009 12:52:27

4,4K Tweet

19,19K Followers

213 Following

Tobias Schmidt (@tpschmidt_) 's Twitter Profile Photo

I love that you can simply plug in the Default JWT Authorizer to an HTTP API Gateway. It automatically handles token validation & authorization context enrichment without any need for coding. You can even specify required scopes for routes directly in your gateway configuration.

I love that you can simply plug in the Default JWT Authorizer to an HTTP API Gateway. It automatically handles token validation & authorization context enrichment without any need for coding.

You can even specify required scopes for routes directly in your gateway configuration.
Tobias Schmidt (@tpschmidt_) 's Twitter Profile Photo

Not exaggerating: I really ๐—ต๐—ฎ๐˜๐—ฒ CloudFormation. Just spent too much time with its design flaws and issues in my life. Nevertheless, there are some cool features like this. Tried to build something similar in my long-term Azure-heavy project with App Service, and it's a pain.

Not exaggerating: I really ๐—ต๐—ฎ๐˜๐—ฒ CloudFormation. Just spent too much time with its design flaws and issues in my life.
Nevertheless, there are some cool features like this.

Tried to build something similar in my long-term Azure-heavy project with App Service, and it's a pain.
Tobias Schmidt (@tpschmidt_) 's Twitter Profile Photo

FYI: You can aggregate Alarms in CloudWatch into higher-level Alarms. ๐Ÿ’โ€โ™‚๏ธ This is really helpful for identifying widespread issues before panicking over an overflowing Alarm inbox, which might just indicate a problem in a specific availability zone or region.

FYI: You can aggregate Alarms in CloudWatch into higher-level Alarms. ๐Ÿ’โ€โ™‚๏ธ

This is really helpful for identifying widespread issues before panicking over an overflowing Alarm inbox, which might just indicate a problem in a specific availability zone or region.
Tobias Schmidt (@tpschmidt_) 's Twitter Profile Photo

Undervalued feature at CloudWatch: Synthetics ๐Ÿค– It really just works, and you can do so much with it. Especially creating visual regression checks is more than just a few clicks. Then hook it up with your Slack channel and send you the diffs on failing checks. โœจ

Undervalued feature at CloudWatch: Synthetics ๐Ÿค–

It really just works, and you can do so much with it. Especially creating visual regression checks is more than just a few clicks.

Then hook it up with your Slack channel and send you the diffs on failing checks. โœจ
Tobias Schmidt (@tpschmidt_) 's Twitter Profile Photo

Are there any real use cases for permission boundaries in IAM? ๐Ÿค” It's been around for quite a while and I've used it in the past to restrict the maximum permissions for roles that are used by IaC tools/pipelines, but I still don't think that I got the right use-case/intention.

Are there any real use cases for permission boundaries in IAM? ๐Ÿค”

It's been around for quite a while and I've used it in the past to restrict the maximum permissions for roles that are used by IaC tools/pipelines, but I still don't think that I got the right use-case/intention.